Keyword: JS_XORBAT.A
99814 Total Search   |   Showing Results : 2001 - 2020
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies registry entries to disable various system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes when a user accesses certain websites where
document contains the following message details luring users to enable macro content: The document hides the JS script in the document itself and not in the macro. It hides the script by using a font color
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
This is the Trend Micro detection for malware that redirect browsers to potentially malicious websites. This Trojan redirects browsers to certain sites. Arrival Details This Trojan may be downloaded
This Trojan may be dropped by other malware. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be dropped by the following malware:
This Trojan may be downloaded by other malware/grayware from remote sites. However, as of this writing, the said sites are inaccessible. This is the Trend Micro detection for files that contain
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. However, as of this writing, the said sites are inaccessible. Arrival Details This Trojan
?partner_id=ARS&language={language}&format=CJSON&var=dynpipclient&version={application version}&newuser=1&mrb= a variant of Win32/Bundled.Toolbar.Ask.G potentially unsafe application (ESET)
\ Windows\CurrentVersion\Internet Settings AutoConfigURL = "https://{BLOCKED}evpnalarm.net/securevpn.js" Download Routine This Trojan connects to the following website(s) to download and execute a malicious
malware/grayware or malicious users. Download Routine This Trojan connects to the following website(s) to download and execute a malicious file: http://{BLOCKED
This malware is related to a spammed message that leverages the news on “Royal Baby." The said spammed message lures users in accessing the related blog which is in actual
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the files it drops, prompting the affected
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Once a user visits an affected Web page, this HTML script launches a hidden